Pre-Summit Workshop

2017 LegalSEC 101 Pre-Summit Workshop

ILTA’s LegalSEC Summit is the premier educational event for people to learn about security in legal. The event is focused on provocative and advanced security content you cannot get anywhere else. For those new(ish) to security, we offer a pre-summit workshop. During this workshop, we'll cover basics of security, incident response, regulatory compliance and privacy, security frameworks and organizations, security awareness, and client audits.

Each educational segment will include a short introduction followed by discussion and table work. These segments are lead-ins to more advanced sessions to occur during the Summit. Attendees will leave with checklists, templates and other valuable resources.

Monday, June 12

9:00 a.m.

Registration

9:00 a.m.

Breakfast

10:00 a.m.

Welcome and Introduction
The 2017 LegalSEC Pre-Summit Workshop is focused on having a business strategy approach to security. During introductions, the LegalSEC Co-Chairs (Scott Roff and Sherri Vollick) will outline how this strategy will be covered throughout the day's sessions. And Peter Kaomeo, ILTA's LegalSEC Steering Committee Chair, will provide an update on ILTA's LegalSEC® initiative.

10:15 a.m.

Building Your Security Stack
If you look at your security from a 10,000-foot view, it can be overwhelming to decide where to invest your security dollars. Money will need to be spent on infrastructure, hardware, operating system and applications. Learn how your money can be well-spent as you hear from peers on where to stack your security dollars.

11:00 a.m.

Break

11:15 a.m.

Budgeting and Prioritizing: A Decision Matrix To Meet Security Needs
Each law firm has similar yet varying security needs, and a decision matrix can be used to help you determine how to prioritize your security budget. See how to use this matrix to address your organization's security needs related to cost, labor, necessity, alternatives, pressures, quality and risk.

12:00 p.m.

Lunch

1:00 p.m.

Information Governance: Identifying Risks and Compliance Related to Security
How does the information you store compare to the data you should be storing? ILTA peers will identify what information they have, where it resides, the risk of having it, and what should be retained or destroyed.

1:45 p.m.

Security Operations: Tales from the Trenches
There are many day-to-day tasks involved with keeping your information secure: monitoring and prioritizing threats, implementing and maintaining policies, applying updates, auditing systems, and more. Come hear tales from the trenches and receive practical advice on how to put some structure around your security operations and move beyond putting out fires.

2:30 p.m.

Break

2:45 p.m.

Security Relationships Between Clients and Vendors
From basic client questionnaires to broad standard information-gathering questionnaires (SIGs), clients are finding ways to comply with regulatory requirements by auditing their vendors (aka law firms). Having a solid plan in place can improve your relationships with clients during this process. Learn how pen testing tools — both internal and third-party —play a role in these security relationships.

3:30 p.m.

Security Mishaps: When Things Go Wrong
Let's explore various types of security incidents, including denial of service, ransomware, outages, pandemics, and the appropriate responses for each. We will talk about emergency communication plans and crisis notification systems, and we will walk through a table-top incident response exercise.

4:15 p.m.

Wrap-Up
Before leaving for the day, come hear an overview of what was covered and share what you learned.